Verified Document

Computer Crimes Search And Seizure Research Paper

¶ … search and seizure of computers in a criminal case. The paper discuses both the challenges and the instruments and approaches needed in gathering evidence from computers. Gathering Evidence

Computer evidence is similar to most other kinds of evidence in several ways. Computer evidence is not that different from the evidence to be collected from a car impounded after a car-chase or the scene of crime in a murder case, in the sense that just like any other form of evidence, it ought to have been legally obtained, if it is to be admitted in court (Oppenheimer, n.d). For one, I will first have to get a search warrant before taking any computer evidence. In civil cases, there has to be consideration for procedures and policies. Many companies have their own incident-report plans that ought to be followed. The state and federal laws that are concerned with search and seizure also ought to be adhered to (Oppenheimer, n.d). In both criminal and civil cases, several conditions should be adhered to in the acquisition of evidence:

It must be legally obtained: the instructions in the incident-report guidelines and the search warrant ought to be adhered to.

Complete: all evidences should be collected even those that, I as an investigator,...

This is especially true for computer evidences that can be easily altered or modified in some ways.
Authentic: the evidence must be the real thing and not a copy or a fake.

Believable: the judge must be able to understand the evidence. It must be explained in such a way that they understand it.

The next step, after knowing the above stated principles of search and seizure, I as the investigator, must also recognize the computer evidence that am going to collect. There are many different types of computer technologies that one can use to store data, including; scanners/printers/copiers that buffer files, servers, wireless access points, routers, GPSs, PDAs, digital cameras, video recorders, iPods, VOIP phones, smartphones, floppy disks, flash disks, DVDs and CDs, external hard drives and computers (Oppenheimer, n.d).

The next step requires the use of a digital camera. The camera is utilized to document the scene by taking photos of: the overall scene, the condition of the computer technology, all the…

Sources used in this document:
References

Boddington, R. (2015, March 17). Phys.org - News and Articles on Science and Technology. The challenges of digital forensics. Retrieved November 1, 2015, from http://phys.org/news/2015-03-digital-forensics.html

Oppenheimer, P. (n.d.). Priscilla Oppenheimer. Computer Forensics: Seizing a Computer. Retrieved November 1, 2015, from http://www.priscilla.com/forensics/ComputerSeizure.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

How to Approach a Server and Search for Malware
Words: 3529 Length: 11 Document Type: Capstone Project

XYZ Company Tasking The plan for processing the potential crime/incident scene depends upon maintaining the integrity of the scene as well as the integrity of the data. That means the first step is to prevent the scene from contamination. Preparing for the search is an important step, therefore, in this process. The team should have the legal authority to proceed with the seizure of evidence and this should be shown upon arrival. Likewise,

Adults on Secured Online Environments
Words: 12910 Length: 50 Document Type: Term Paper

Next, the researcher will conduct a query of the computer awareness of education administrators, teachers, parents, and students in the New Orleans school district, then evaluation of documented data will provide a research base of the required elements needed to consider while developing a framework that can be used as a guide by educational leaders and parents for the protection of children at school and at home. Research areas

Cyber-Citizen, USA Cyber-Citizen USA the
Words: 5130 Length: 20 Document Type: Research Paper

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

Patriot Act Vs. Constitutionally Guaranteed
Words: 6439 Length: 20 Document Type: Term Paper

" According to the American Civil Liberties Union (ACLU). A "national security letter" (NSL) is basically a written demand by the FBI or other federal law enforcement agencies for a group or organization to turn over records or data or documents, with no warrant attached to the demand. They are given out without probably cause or any justice-related back-up, and have been used extensively since the Patriot Act; they are

Privacy for High School Students
Words: 12892 Length: 40 Document Type: Term Paper

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now